1. Change the IP multicast address 233.50.18.2 to Ethernet multicast addresses.
.
2. Answer the following question about client-server programs:
a. Which program is running on the local machine
b. Which program is running on the remote machine (client or server)?
c. Which program is an infinitive program (client or server)?
d. Which program is a finite program (client or server)?
.
3. The following is a dump of a UDP header in hexadecimal format: CB820045007C12B2
a. What is the source port number (in decimal)?
b. What is the destination port number (in decimal)?
c. What is the client that uses the services of UDP in this case?
Hi,
3. Given UDP header dump is CB820045007C12B2
a. Source port is given by First four hexadecimal digits which are CB82 which is 52098 in decimal
b.Destination port is given by the next 4 hexadecimal digits which are 0045 which is 69 in decimal
c. Since destination port is 69, Port 69 is the Trivial File Transfer Protocol (TFTP) port. By convention, all machines use these port numbers for these services.
2. Client server programs is a paradigm where client sends requests to server and server is reponsible for processing them.so by definition this paradigm says that client is a finite program which runs in local machine and sends requests to server which is an infinite program running on the remote machine.
a. Client as it is the request sender
b. Server, because it should be up to take requests from clients
c. Server is an infinite program typically which keeps listening to client requests
d.client is a finite program which only sends requests to server.
1. Ethernet addresses have 48 bit address fields for both source and destination and are expressed in hexadecimal in general. and for multicast the first 24 bits are reserved as 0100 . 5e, followed by 0, and the remaning 23(48-24-1) give the multicast address as below
Given IP multicast is 230 . 50 .18. 2
writing it in decimal
11101001 . 00110010 . 00010010 . 00000010
we have to map this 28 bits onto the 23 bits available which is done by choosing the lower order bits i.e
so the next 23bits are, 0110010 . 00010010 . 00000010 (23 bits from right)
we know the 1st 25 bits are 0100 . 5e and 0 i.e 0001 . 0000 . 0101 . 1110 . 0
now combining both we get
00010000 . 0101 1110 . 00110010 .00010010 . 00000010
which is 0100:5E32:1102
Thumbs up if this was helpful, otherwise let me know in comments.
1. Change the IP multicast address 233.50.18.2 to Ethernet multicast addresses. . 2. Answer the following...
Consider the following network. IP and Ethernet addresses are marked for all interfaces. Assume a client on host A sends a TCP connection request message to a web server on host B. Show all the headers in the packet on link 1 and on link 2, assuming the addressing indicated on the figure. Include IP source and destination addresses, Ethernet source and destination addressees, and TCP source and destination port numbers. Use port numbers that make sense for the given...
Can anyone answer and explain the following questions from Into to Computer Networking course? 1) PTSN networks are: a) Packet-switching networks offering connection-oriented services b) Packet-switching networks offering connectionless services c) Circuit-switching networks offering connection-oriented services d) Circuit-switching networks offering connectionless serive 2) Connection setup and temination, if performed, takes places in this layer of the internet model a) Presentation layer b) Session layer c) Network layer d) Physical layer 3) UDP sockets are identified by: a) Client program port...
Examine the following: What header fields are used to identify a UDP socket? source IP address destination port number source port number destination IP address
14. (10 Points) Suppose Proces A running on Host Process B running on Host Y vi running on Host Z is communicating with Process via a TCP connection. Let x, y, and z be the IP addresses o and Host Z, respectively. Assume the port number o the port number of Process B is 464 26145, and the port number of Process D is 80. a. What are the identifiers of the socket associated with Process B when it is...
166 Chapter 8: TCP/IP Applications Getting Down to Business The way network communication all those ls and Os) goes in and out of a machine physically is through the NIC (network interface card). The way network communication goes in and out of a machine logically though, is through a program or service. A service is a program that runs in the background, independent of a logon, that provides functionalities to a system. Windows client machines, for instance, have a Workstation...
comm & networks fund 12. (8pts) Change the following IP addresses from dotted- decimal notation to binary notation. a. 197.163.222.19 b. Show in details how to convert 197 into binary 13. (&pts) Change the following IP addresses from binary notation to dotted-decimal notation. a. 11011111 10110000 00011111 01011101 b. Show in details how to convert 01011101 into decimal 14. (6pts) Find the class of the following IP addresses (i.e., classful addressing) a. 11110111 11110011 10000111 11011101 b. 10101111 11000000 11110000...
implement the follwing code using command promp or Eclipse or any other program you are familiar with. keep the name of the classes exatcly the same as requested for testing purpose. please follow each instruction provided below Objective of this assignment o get you famililar with developing and implementing TCP or UDP sockets. What you need to do: I. Implement a simple TCP Client-Server application 2. and analyze round trip time measurements for each of the above applications 3. The...
12. The combination of the source and destination IP addresses and the source and destination port numbers is known as a socket. What is a socket used for? 13. Label the following port number ranges. _0 to 1023 1024 to 49151 49152 to 65535 14. What DOS command can be used to see which active TCP connections are open and wing on a networked host? 15. Why is dividing application data into segments necessary 16. Labelcach of the following delivery...
Refer to the network figure above, showing two Ethernet Subnets connected through an IP Router, for questions #1, #2 and #3. For each device, both its Internet Protocol (IP) address and its MAC address (also called the Physical address or the Ethernet address) are shown. The Subnet Mask used by all devices is 255.255.255.192 (which is same as prefix length “/26”). (5 points) Assuming that Client #1 sent a packet to Client #3 and then Client #3 sent a packet...
You can refer chapter 2 and chapter 3 of Computer Networking: A Top-Down approach by Kurose and Ross for the following labs. Please read the instructions below for submissions. Upload the shared pcap file (Homework5.pacp) into wireshark. HTTP In this lab, we’ll explore several aspects of the HTTP protocol. Capture packets and filter for http protocol and answer the following questions. (Hint: Apply http filer) What version of HTTP version(1.0 or 1.1) is client running and what is the version...